Search Results - (( based extraction path algorithm ) OR ( pattern detection based algorithm ))
Search alternatives:
- pattern detection »
- based extraction »
- extraction path »
- detection based »
- path algorithm »
-
1
Animal voice recognition for identification (ID) detection system
Published 2011“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Dog voice identification (ID) for detection system
Published 2012“…In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Feature extraction: hand shape, hand position and hand trajectory path
Published 2011“…Vision-based hand posture detection and tracking is an important issue for Human to Computer Interaction applications. …”
Get full text
Get full text
Get full text
Book Chapter -
4
Whale Optimisation Freeman Chain Code (WO-FCC) extraction algorithm for handwritten character recognition
Published 2021“…In this paper, we propose a metaheuristic method for feature extraction algorithm with Whale Optimisation Algorithm (WOA) based HCR. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
An algorithm for Elliott Waves pattern detection
Published 2018“…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
6
An algorithm for Elliott Waves pattern detection
Published 2018“…All of the fundamental features of an proper Elliott Wave pattern (EW pattern) are reviewed and explained. Based on this knowledge, an algorithm for detection of these patterns is designed, developed and tested. …”
Get full text
Get full text
Article -
7
Abnormal Pattern Detection In Ppg Signals Using Time Series Analysis
Published 2022“…This project’s objectives are to implement rule-based algorithm method for abnormal pattern detection in PPG signals, and to investigate the accuracy and performance of rule-based algorithm in detecting the abnormal pattern. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Bat Algorithm for Complex Event Pattern Detection in Sentiment Analysis
Published 2021“…Thus, this study proposed a Bat Algorithm (BA) to address the complex learning structure of DBN in detecting sentiment patterns. …”
Get full text
Get full text
Monograph -
9
High impedance fault detection and identification based on pattern recognition of phase displacement computation
Published 2018“…This paper proposes a new algorithm for high-impedance-fault (HIF) detection based on phase displacement computation (PDC). …”
Get full text
Get full text
Article -
10
Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing
Published 2007“…The routing problems in VLSI physical design are, in essence, shortest path problems in special graphs. It has been shown that the performance of a graph-based shortest path algorithm can severely be affected by the performance of its priority queue. …”
Get full text
Get full text
Get full text
Thesis -
11
Moiré Method Based Tilt Sensing System For Landslides Monitoring Using Raspberry PI
Published 2019“…An algorithm to detect the centroid of the moiré fringe pattern was developed. …”
Get full text
Get full text
Monograph -
12
-
13
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
14
Very Large Scale Integration Cell Based Path Extractor For Physical To Layout Mapping In Fault Isolation Work
Published 2017“…This development and study of the path extract method carries significance in areas of EDA and debug diagnosis work.…”
Get full text
Get full text
Thesis -
15
-
16
An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability
Published 2023“…In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). …”
Get full text
Get full text
Article -
17
-
18
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
Published 2011“…Moreover, most of the memory test algorithm does not have the capability to detect and diagnose NPSF. …”
Get full text
Get full text
Thesis -
19
Artificial immune system based on real valued negative selection algorithms for anomaly detection
Published 2015“…With respect to all the algorithms, V-Detector proved to be superior and surpassed all other algorithms based on performance and execution time.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Monograph
